Date
July 3, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.228872] ================================================================== [ 19.228996] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 19.229136] Write of size 1 at addr fff00000c6345878 by task kunit_try_catch/142 [ 19.229257] [ 19.229334] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.229511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.229570] Hardware name: linux,dummy-virt (DT) [ 19.229641] Call trace: [ 19.229699] show_stack+0x20/0x38 (C) [ 19.229807] dump_stack_lvl+0x8c/0xd0 [ 19.229912] print_report+0x118/0x608 [ 19.230646] kasan_report+0xdc/0x128 [ 19.231068] __asan_report_store1_noabort+0x20/0x30 [ 19.231227] kmalloc_track_caller_oob_right+0x418/0x488 [ 19.231403] kunit_try_run_case+0x170/0x3f0 [ 19.231556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.231715] kthread+0x328/0x630 [ 19.231817] ret_from_fork+0x10/0x20 [ 19.231972] [ 19.232054] Allocated by task 142: [ 19.232152] kasan_save_stack+0x3c/0x68 [ 19.232280] kasan_save_track+0x20/0x40 [ 19.232383] kasan_save_alloc_info+0x40/0x58 [ 19.232482] __kasan_kmalloc+0xd4/0xd8 [ 19.232584] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.232683] kmalloc_track_caller_oob_right+0x184/0x488 [ 19.232771] kunit_try_run_case+0x170/0x3f0 [ 19.232850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.232941] kthread+0x328/0x630 [ 19.233009] ret_from_fork+0x10/0x20 [ 19.233094] [ 19.233134] The buggy address belongs to the object at fff00000c6345800 [ 19.233134] which belongs to the cache kmalloc-128 of size 128 [ 19.233876] The buggy address is located 0 bytes to the right of [ 19.233876] allocated 120-byte region [fff00000c6345800, fff00000c6345878) [ 19.234053] [ 19.234120] The buggy address belongs to the physical page: [ 19.234182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.234524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.234695] page_type: f5(slab) [ 19.234788] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.234896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.234993] page dumped because: kasan: bad access detected [ 19.235077] [ 19.235117] Memory state around the buggy address: [ 19.235187] fff00000c6345700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.235285] fff00000c6345780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235380] >fff00000c6345800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.235464] ^ [ 19.235557] fff00000c6345880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235661] fff00000c6345900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235785] ================================================================== [ 19.220041] ================================================================== [ 19.220650] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.220838] Write of size 1 at addr fff00000c6345778 by task kunit_try_catch/142 [ 19.220975] [ 19.221124] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.221383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.221468] Hardware name: linux,dummy-virt (DT) [ 19.221573] Call trace: [ 19.221646] show_stack+0x20/0x38 (C) [ 19.221798] dump_stack_lvl+0x8c/0xd0 [ 19.222125] print_report+0x118/0x608 [ 19.222253] kasan_report+0xdc/0x128 [ 19.222356] __asan_report_store1_noabort+0x20/0x30 [ 19.222595] kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.223121] kunit_try_run_case+0x170/0x3f0 [ 19.223312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.223487] kthread+0x328/0x630 [ 19.223634] ret_from_fork+0x10/0x20 [ 19.223790] [ 19.223855] Allocated by task 142: [ 19.223929] kasan_save_stack+0x3c/0x68 [ 19.224042] kasan_save_track+0x20/0x40 [ 19.224114] kasan_save_alloc_info+0x40/0x58 [ 19.224192] __kasan_kmalloc+0xd4/0xd8 [ 19.224271] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.224786] kmalloc_track_caller_oob_right+0xa8/0x488 [ 19.224976] kunit_try_run_case+0x170/0x3f0 [ 19.225078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.225174] kthread+0x328/0x630 [ 19.225245] ret_from_fork+0x10/0x20 [ 19.225320] [ 19.225362] The buggy address belongs to the object at fff00000c6345700 [ 19.225362] which belongs to the cache kmalloc-128 of size 128 [ 19.225481] The buggy address is located 0 bytes to the right of [ 19.225481] allocated 120-byte region [fff00000c6345700, fff00000c6345778) [ 19.225619] [ 19.225699] The buggy address belongs to the physical page: [ 19.225765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106345 [ 19.226168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.226291] page_type: f5(slab) [ 19.226376] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.226597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.226683] page dumped because: kasan: bad access detected [ 19.226898] [ 19.226942] Memory state around the buggy address: [ 19.227015] fff00000c6345600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.227130] fff00000c6345680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227221] >fff00000c6345700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.227323] ^ [ 19.227456] fff00000c6345780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227597] fff00000c6345800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.227681] ==================================================================
[ 10.936637] ================================================================== [ 10.937098] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.937452] Write of size 1 at addr ffff8881027a9a78 by task kunit_try_catch/159 [ 10.937897] [ 10.938015] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.938057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.938068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.938088] Call Trace: [ 10.938099] <TASK> [ 10.938112] dump_stack_lvl+0x73/0xb0 [ 10.938151] print_report+0xd1/0x650 [ 10.938172] ? __virt_addr_valid+0x1db/0x2d0 [ 10.938194] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.938227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.938248] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.938272] kasan_report+0x141/0x180 [ 10.938292] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.938320] __asan_report_store1_noabort+0x1b/0x30 [ 10.938340] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 10.938375] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 10.938400] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.938424] ? trace_hardirqs_on+0x37/0xe0 [ 10.938447] ? __pfx_read_tsc+0x10/0x10 [ 10.938468] ? ktime_get_ts64+0x86/0x230 [ 10.938490] kunit_try_run_case+0x1a5/0x480 [ 10.938518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.938541] ? queued_spin_lock_slowpath+0x116/0xb40 [ 10.938563] ? __kthread_parkme+0x82/0x180 [ 10.938582] ? preempt_count_sub+0x50/0x80 [ 10.938605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.938627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.938648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.938670] kthread+0x337/0x6f0 [ 10.938688] ? trace_preempt_on+0x20/0xc0 [ 10.938708] ? __pfx_kthread+0x10/0x10 [ 10.938728] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.938747] ? calculate_sigpending+0x7b/0xa0 [ 10.938769] ? __pfx_kthread+0x10/0x10 [ 10.938789] ret_from_fork+0x116/0x1d0 [ 10.938806] ? __pfx_kthread+0x10/0x10 [ 10.938825] ret_from_fork_asm+0x1a/0x30 [ 10.938855] </TASK> [ 10.938865] [ 10.946598] Allocated by task 159: [ 10.946784] kasan_save_stack+0x45/0x70 [ 10.946986] kasan_save_track+0x18/0x40 [ 10.947191] kasan_save_alloc_info+0x3b/0x50 [ 10.947442] __kasan_kmalloc+0xb7/0xc0 [ 10.947594] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 10.947837] kmalloc_track_caller_oob_right+0x99/0x520 [ 10.948006] kunit_try_run_case+0x1a5/0x480 [ 10.948247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.948556] kthread+0x337/0x6f0 [ 10.948724] ret_from_fork+0x116/0x1d0 [ 10.948856] ret_from_fork_asm+0x1a/0x30 [ 10.948992] [ 10.949061] The buggy address belongs to the object at ffff8881027a9a00 [ 10.949061] which belongs to the cache kmalloc-128 of size 128 [ 10.949735] The buggy address is located 0 bytes to the right of [ 10.949735] allocated 120-byte region [ffff8881027a9a00, ffff8881027a9a78) [ 10.950369] [ 10.950442] The buggy address belongs to the physical page: [ 10.950619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a9 [ 10.951299] flags: 0x200000000000000(node=0|zone=2) [ 10.951550] page_type: f5(slab) [ 10.951721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.952020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.952507] page dumped because: kasan: bad access detected [ 10.952720] [ 10.952817] Memory state around the buggy address: [ 10.953003] ffff8881027a9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.953436] ffff8881027a9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.953724] >ffff8881027a9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 10.953998] ^ [ 10.954522] ffff8881027a9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.954797] ffff8881027a9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.955091] ================================================================== [ 10.955787] ================================================================== [ 10.956154] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.956692] Write of size 1 at addr ffff8881027a9b78 by task kunit_try_catch/159 [ 10.956923] [ 10.957007] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 10.957045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 10.957056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 10.957075] Call Trace: [ 10.957086] <TASK> [ 10.957098] dump_stack_lvl+0x73/0xb0 [ 10.957135] print_report+0xd1/0x650 [ 10.957157] ? __virt_addr_valid+0x1db/0x2d0 [ 10.957178] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.957201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 10.957222] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.957245] kasan_report+0x141/0x180 [ 10.957266] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.957294] __asan_report_store1_noabort+0x1b/0x30 [ 10.957314] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 10.957337] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 10.957361] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 10.957383] ? trace_hardirqs_on+0x37/0xe0 [ 10.957405] ? __pfx_read_tsc+0x10/0x10 [ 10.957471] ? ktime_get_ts64+0x86/0x230 [ 10.957496] kunit_try_run_case+0x1a5/0x480 [ 10.957519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.957542] ? queued_spin_lock_slowpath+0x116/0xb40 [ 10.957564] ? __kthread_parkme+0x82/0x180 [ 10.957583] ? preempt_count_sub+0x50/0x80 [ 10.957605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 10.957627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.957648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 10.957670] kthread+0x337/0x6f0 [ 10.957688] ? trace_preempt_on+0x20/0xc0 [ 10.957708] ? __pfx_kthread+0x10/0x10 [ 10.957728] ? _raw_spin_unlock_irq+0x47/0x80 [ 10.957747] ? calculate_sigpending+0x7b/0xa0 [ 10.957769] ? __pfx_kthread+0x10/0x10 [ 10.957789] ret_from_fork+0x116/0x1d0 [ 10.957807] ? __pfx_kthread+0x10/0x10 [ 10.957826] ret_from_fork_asm+0x1a/0x30 [ 10.957855] </TASK> [ 10.957864] [ 10.965826] Allocated by task 159: [ 10.966002] kasan_save_stack+0x45/0x70 [ 10.966193] kasan_save_track+0x18/0x40 [ 10.966371] kasan_save_alloc_info+0x3b/0x50 [ 10.966631] __kasan_kmalloc+0xb7/0xc0 [ 10.966767] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 10.967011] kmalloc_track_caller_oob_right+0x19a/0x520 [ 10.967311] kunit_try_run_case+0x1a5/0x480 [ 10.967597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 10.967843] kthread+0x337/0x6f0 [ 10.967980] ret_from_fork+0x116/0x1d0 [ 10.968119] ret_from_fork_asm+0x1a/0x30 [ 10.968324] [ 10.968419] The buggy address belongs to the object at ffff8881027a9b00 [ 10.968419] which belongs to the cache kmalloc-128 of size 128 [ 10.968830] The buggy address is located 0 bytes to the right of [ 10.968830] allocated 120-byte region [ffff8881027a9b00, ffff8881027a9b78) [ 10.969402] [ 10.969503] The buggy address belongs to the physical page: [ 10.969921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a9 [ 10.970286] flags: 0x200000000000000(node=0|zone=2) [ 10.970572] page_type: f5(slab) [ 10.970726] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 10.971052] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 10.971475] page dumped because: kasan: bad access detected [ 10.971652] [ 10.971748] Memory state around the buggy address: [ 10.971974] ffff8881027a9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 10.972484] ffff8881027a9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.972786] >ffff8881027a9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 10.973042] ^ [ 10.973589] ffff8881027a9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.973886] ffff8881027a9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 10.974149] ==================================================================